SlideShare a Scribd company logo
How Security Works in AWS
&
How You Can Architect For It
Markku Lepistö
Principal Technology Evangelist
@markkulepisto
AWS Cloud Security
“Based on our experience, I believe that we can be
even more secure in the AWS cloud than in our
own data centers.”
-Tom Soderstrom, CTO, NASA JPL
Visibility
–  In the AWS cloud, see your entire infrastructure at the click of a
mouse
–  Can you map your current network?
Defense in Depth
Multi-level security
•  Physical security of the data centers
•  Network security
•  System security
•  Data security DATA
Gain access to a world-class security team
Where would some of the world’s top security
people like to work? At scale on huge
challenges with huge rewards
So AWS has world-class security and
compliance teams watching your back!
Every customer benefits from the tough
scrutiny of other AWS customers
Build everything on a constantly improving security baseline
AWS	
  Founda+on	
  Services	
  
Compute	
   Storage	
   Database	
   Networking	
  
AWS	
  Global	
  
Infrastructure	
   Regions	
  
Availability	
  Zones	
  
Edge	
  Loca+ons	
  
AWS	
  Founda+on	
  Services	
  
Compute	
   Storage	
   Database	
   Networking	
  
AWS	
  Global	
  
Infrastructure	
   Regions	
  
Availability	
  Zones	
  
Edge	
  Loca+ons	
  
Client-­‐side	
  Data	
  
Encryp2on	
  
Server-­‐side	
  Data	
  
Encryp2on	
  
Network	
  Traffic	
  
Protec2on	
  
Pla<orm,	
  Applica2ons,	
  Iden2ty	
  &	
  Access	
  Management	
  
Opera2ng	
  System,	
  Network	
  &	
  Firewall	
  Configura2on	
  
Customer	
  content	
  
Customers	
  
Let AWS do the heavy lifting for you
Customers are
responsible for
their security and
compliance IN
the Cloud
AWS is
responsible for
the security OF
the Cloud
AWS	
  Founda+on	
  Services	
  
Compute	
   Storage	
   Database	
   Networking	
  
AWS	
  Global	
  
Infrastructure	
   Regions	
  
Availability	
  Zones	
  
Edge	
  Loca+ons	
  
Your	
  own	
  
accredita2on	
  
	
  
Meet your own security objectives
Your	
  own	
  
cer2fica2ons	
  
Your	
  own	
  
external	
  audits	
  
Customer scope
and effort is
reduced
Better results
through focused
efforts
Built on AWS
consistent
baseline controls
Customers	
  
AWS	
  Region	
  
US-WEST (N. California)
 EU-WEST (Ireland)
ASIA PAC (Tokyo)
ASIA PAC (Singapore)
US-WEST (Oregon)
SOUTH AMERICA (Sao Paulo)
US-EAST (Virginia)
GOV CLOUD
ASIA PAC
(Sydney)
You can stay onshore in any location that you need to
You can choose to keep all your content onshore in any
AWS region of YOUR choice
•  AWS makes no secondary use of customer content
•  Managing your privacy objectives any way that you want
•  Keep data in your chosen format and move it, or delete it, at any
time you choose
•  No automatic replication of data outside of your chosen AWS
Region
•  Customers can encrypt their content any way they choose
You always have full ownership and control
You can
improve your security
with the AWS cloud
Every solution can be resilient and fault tolerant
AWS	
  operates	
  scalable,	
  fault	
  tolerant	
  services	
  
Build	
  resilient	
  solu2ons	
  opera2ng	
  in	
  mul2ple	
  datacenters	
  
AWS	
  helps	
  simplify	
  ac2ve-­‐ac2ve	
  resilient	
  solu2ons	
  
All	
  AWS	
  facili2es	
  are	
  always	
  on	
  
No	
  need	
  for	
  a	
  “Disaster	
  Recovery	
  Datacenter”	
  when	
  you	
  can	
  
have	
  resilience	
  
Every	
  AWS	
  facility	
  managed	
  to	
  the	
  same	
  global	
  standards	
  
AWS has robust connectivity and bandwidth
Each AZ has multiple, redundant Tier 1 ISP Service Providers
Resilient network infrastructure
Every network has fine-grained security built-in
AvailabilityZoneA
AvailabilityZoneB
You control your VPC
address range
•  Your own private, isolated
section of the AWS cloud
•  Every VPC has a private IP
address space you define
•  Create your own subnets and
control all internal and
external connectivity
AWS network security
•  AWS network will prevent
spoofing and other common
layer 2 attacks
•  Every compute instance gets
multiple security groups -
stateful firewalls
•  Every subnet gets network
access control lists
You can create multi-tier architectures every time
VPC A - 10.0.0.0/16
AvailabilityZoneA
10.0.1.0/24
10.0.2.0/24
10.0.3.0/24
EC
2
10.0.5.0/24
Jump
host
10.0.4.0/24
EC
2
App Log
EC
2
Web
Load
balancing
Firewall every single compute instance
VPC A - 10.0.0.0/16
AvailabilityZoneA
10.0.1.0/24
10.0.2.0/24
10.0.3.0/24
EC
2
10.0.5.0/24
Jump
10.0.4.0/24
EC
2
App
“Web servers will accept Port 80
from load balancers”
“App servers will
accept Port 8080
from web
servers”
“Allow SSH
access only from
from Jump Hosts”
Log
EC
2
Web
Load
balancing
Enable network access control on every subnet
VPC A - 10.0.0.0/16
AvailabilityZoneA
10.0.1.0/24
10.0.2.0/24
10.0.3.0/24
EC
2
10.0.5.0/24
Jump
10.0.4.0/24
EC
2
App Log
EC
2
Web
“Deny all traffic between the web
server subnet and the database
server subnet”
Load
balancing
Control every Internet connection
VPC A - 10.0.0.0/16
AvailabilityZoneA
10.0.1.0/24
10.0.2.0/24
EC
2
10.0.3.0/24
EC
2
10.0.4.0/24
EC
2
App
EC
2
WebEC
2
WebEC
2
EC
2
Web
Internet Gateway
Control Internet routing
•  Create Public subnets and
Private subnets
•  Implement DMZ architectures
as per normal best practices
•  Allocate static Elastic IP
addresses or use AWS-
managed public IP addresses
Load
balancing
Connect in private to your existing datacentres
VPC A - 10.0.0.0/16
AvailabilityZoneA
10.0.1.0/24
10.0.2.0/24
EC
2
10.0.3.0/24
EC
2
10.0.4.0/24
EC
2
App
EC
2
WebEC
2
WebEC
2
EC
2
Web
Use Internet VPNs
or use AWS Direct
Connect
Your premises
Load
balancing
You can route to the Internet using your gateway
VPC A - 10.0.0.0/16
AvailabilityZoneA
10.0.1.0/24
10.0.2.0/24
EC
2
10.0.3.0/24
EC
2
10.0.4.0/24
EC
2
App
EC
2
WebEC
2
WebEC
2
EC
2
Web
Use Internet VPNs
or use AWS Direct
Connect
Your premises
Load
balancing
Create flexible multi-VPC hybrid environments
Your organisation
Project Teams Marketing
Business Units Reporting
Digital /
Websites
Dev and
Test
Redshift
EMR
Analytics
Internal
Enterprise
Apps
Amazon
S3
Amazon
Glacier
Storage/
Backup
Every website can absorb attacks and scale out
Amazon S3
Distributed
attackers
Customers
Customers
Route53
Singapore region
CloudFront
Your VPC
WAFWAF WAFWAF
ELB ELB
ELB ELB
App App App App
Auto
Scaling
Auto
Scaling
Auto
Scaling
Auto
Scaling
 
Encrypt	
  your	
  Elas2c	
  Block	
  Store	
  volumes	
  any	
  way	
  you	
  like	
  
•  AWS	
  na2ve	
  EBS	
  encryp2on	
  for	
  free	
  with	
  a	
  mouse-­‐click	
  
•  Encrypt	
  yourself	
  using	
  free	
  u2li2es,	
  plus	
  Trend,	
  SafeNet	
  and	
  other	
  
partners	
  for	
  high-­‐assurance	
  key	
  management	
  solu2ons	
  
Amazon	
  S3	
  offers	
  either	
  server	
  or	
  client-­‐side	
  encryp2on	
  
•  Manage	
  your	
  own	
  keys	
  or	
  let	
  AWS	
  do	
  it	
  for	
  you	
  
RedshiT	
  has	
  one-­‐click	
  disk	
  encryp2on	
  as	
  standard	
  
•  Encrypt	
  your	
  data	
  analy2cs	
  
•  You	
  can	
  supply	
  your	
  own	
  keys	
  
RDS	
  supports	
  transparent	
  data	
  encryp2on	
  (TDE)	
  
•  Easily	
  encrypt	
  sensi2ve	
  database	
  tables	
  
You can encrypt your sensitive information everywhere
DBA
Tamper-resistant customer controlled hardware
security modules within your VPC
•  Industry-standard SafeNet Luna devices. Common Criteria
EAL4+, NIST FIPS 140-2 certified
•  No access from Amazon administrators who manage and
maintain the appliance
•  High availability and replication with on-premise HSMs
Reliable & Durable Key Storage
•  Use for transparent data encryption on self-managed
databases and natively with AWS Redshift
•  Integrate with applications using Java APIs and AWS
SDKs
•  Integration with marketplace disk-encryption and SSL
You can store your encryption keys in AWS CloudHSM
You can use your own HSMs if you want
Your premises
Applications
Your HSM
NATCloudHSM NATCloudHSM
Volume, object,
database encryption
Signing / DRM /
apps
EC2
SYNC
EBS
S3
Amazon S3
Amazon Glacier
You can enforce consistent security on your hosts
Launch
instanc
e
EC2
AMI catalogue Running instance Your instance
Hardening
Audit and logging
Vulnerability management
Malware and HIPS
Whitelisting and integrity
User administration
Operating system
Configur
e
instance
You	
  control	
  the	
  configura2on	
  of	
  your	
  EC2	
  
compute	
  instances	
  and	
  can	
  configure	
  and	
  harden	
  
opera2ng	
  environments	
  to	
  your	
  own	
  specs
Use host-based protection software
•  Apply best-practice top 5 mitigation strategies!
Think about how you will manage administrative users
•  Restrict access as much as possible
Build out the rest of your standard security environment
•  Connect to your existing services, e.g. SIEM
Old World – Static, Fixed Systems
DB1 DB2
App1 App2
Web1 Web2
SW1 SW2
LB1 LB2
“Cloud applications have
amorphous, polymorphic
attack surfaces.”
-Jason Chan
Director of Engineering,
Cloud Security
Netflix
What’s not there
is not a hole
Install Only the Packages You Use
YOUR CODE
CORE SERVICES
3rd PARTY
LIBRARIES
OPERATING
SYSTEM
Bare minimum, Just-enough-OS
Install & run only the services you use
Install only the libraries you use
Upgrade
&
Patch
ALL
Continuously
Each app tier has only its own code
« Cloud Instance is an
implementation of a
known, good state »
Dr Rich Wolski, UCSB
AMIAMIAMI
YOUR CODE
CORE SERVICES
3rd PARTY
LIBRARIES
OPERATING
SYSTEM
YOUR CODE
CORE SERVICES
3rd PARTY
LIBRARIES
OPERATING
SYSTEM
YOUR CODE
CORE SERVICES
3rd PARTY
LIBRARIES
OPERATING
SYSTEM
Pre-baked Image Base OS Image + Orchestration
3rd Party Configuration Mgmt & Orchestration Tools
AWS	
  OpsWorks	
   AWS	
  
CloudForma+on	
  
AWS	
  Elas+c	
  
Beanstalk	
  
DevOps	
  framework	
  for	
  
applica+on	
  lifecycle	
  
management	
  and	
  
automa+on	
  
Templates	
  to	
  deploy	
  &	
  
update	
  infrastructure	
  
as	
  code	
  
Automated	
  resource	
  
management	
  –	
  web	
  
apps	
  made	
  easy	
  
DIY	
  /	
  	
  
On	
  Demand	
  
DIY,	
  on	
  demand	
  
resources:	
  EC2,	
  S3,	
  
custom	
  AMI’s,	
  etc.	
  
ControlConvenience
AWS Services for Application Lifecycle Management
Validate All Inputs
Your Code
Never Assume Input Validity
Strict Checks and Discard
API /
Interface /
Port
Control access and segregate duties everywhere
With	
  AWS	
  IAM	
  you	
  get	
  to	
  control	
  who	
  can	
  do	
  
what	
  in	
  your	
  AWS	
  environment	
  and	
  from	
  where	
  
	
  
Fine-­‐grained	
  control	
  of	
  your	
  AWS	
  cloud	
  with	
  two-­‐
factor	
  authen2ca2on	
  
	
  
Integrated	
  with	
  your	
  exis2ng	
  corporate	
  directory	
  
using	
  SAML	
  2.0	
  and	
  single	
  sign-­‐on	
  
AWS account
owner
Network
management
Security
management
Server
management
Storage
management
Full visibility of your AWS environment
•  CloudTrail will record access to API calls and save logs in
your S3 buckets, no matter how those API calls were
made
Who did what and when and from what IP address
•  Support for many AWS services and growing - includes
EC2, EBS, VPC, RDS, IAM and RedShift
•  Easily Aggregate all log information
Out of the box integration with log analysis tools from
AWS partners including Splunk, AlertLogic and SumoLogic
Get consistent visibility of logs that you can monitor
You get to do all of this in
DEVELOPMENT
TESTING
PRE-PRODUCTION
LIVE
Read AWS security whitepapers, tips and good practices
•  http://blogs.aws.amazon.com/security
•  http://aws.amazon.com/compliance
•  http://aws.amazon.com/security
•  Risk and compliance, best practices, audit guides and
operational checklists to help you before you go live
•  Workshop	
  solu2ons	
  with	
  an	
  AWS	
  solu2ons	
  architect,	
  including	
  me!	
  
•  Get	
  free	
  trials	
  of	
  security	
  from	
  AWS	
  Partners	
  on	
  the	
  AWS	
  marketplace
Sign up for AWS premium support
•  http://aws.amazon.com/support
•  Get help when you need it most – as you grow
•  Choose different levels of support with no long-term commitment
Further info and how to get AWS support
SHOW MEALREADY !
DEMOS
1.  Use IAM & Multi-Factor Authentication to login to AWS
2.  Create new Amazon VPC in Singapore
3.  IPSEC VPN connect Tokyo office with Singapore VPC
4.  Customize EC2 Instance with minimal footprint, secure config
5.  Control Security Groups
VPN
Tunnels	
  
Customer VPN
Gateway	
  
Desktop
VPC - Singapore
•  VPC CIDR Network: 10.100.0.0/16
•  VPC Subnet 1: 10.100.0.0/23
•  VPC Subnet 2: 10.100.2.0/23
•  VPN Type: Dynamic BGP
Office – Tokyo
•  Office Network: 10.96.24.0/21
•  VPN Gateway IP: 54.92.27.101
Our First Virtual Private Cloud
Application
Server	
  
Availability Zone BAvailability Zone A
Contact Your AWS Account Manager
To discuss your use cases & opportunities to
try AWS services
Follow us on at @AWSCloudSEAsia
Join the AWS User Group at
Facebook.com – search ‘AWS User Group Singapore’
Thank	
  you	
  
Markku	
  Lepistö	
  –	
  Principal	
  Technology	
  Evangelist	
  
@markkulepisto	
  

More Related Content

What's hot

What's hot (20)

Aws Architecture Fundamentals
Aws Architecture FundamentalsAws Architecture Fundamentals
Aws Architecture Fundamentals
 
(SEC311) Architecting for End-to-End Security in the Enterprise | AWS re:Inve...
(SEC311) Architecting for End-to-End Security in the Enterprise | AWS re:Inve...(SEC311) Architecting for End-to-End Security in the Enterprise | AWS re:Inve...
(SEC311) Architecting for End-to-End Security in the Enterprise | AWS re:Inve...
 
AWS re:Invent 2016: VMware and AWS Together - VMware Cloud on AWS (ENT317)
AWS re:Invent 2016: VMware and AWS Together - VMware Cloud on AWS (ENT317)AWS re:Invent 2016: VMware and AWS Together - VMware Cloud on AWS (ENT317)
AWS re:Invent 2016: VMware and AWS Together - VMware Cloud on AWS (ENT317)
 
Security on AWS
Security on AWSSecurity on AWS
Security on AWS
 
Zero to Sixty: AWS OpsWorks (DMG202) | AWS re:Invent 2013
Zero to Sixty: AWS OpsWorks (DMG202) | AWS re:Invent 2013Zero to Sixty: AWS OpsWorks (DMG202) | AWS re:Invent 2013
Zero to Sixty: AWS OpsWorks (DMG202) | AWS re:Invent 2013
 
Creating Your Virtual Data Center: VPC Fundamentals
Creating Your Virtual Data Center: VPC FundamentalsCreating Your Virtual Data Center: VPC Fundamentals
Creating Your Virtual Data Center: VPC Fundamentals
 
VMware and AWS Together - VMware Cloud on AWS
VMware and AWS Together  - VMware Cloud on AWSVMware and AWS Together  - VMware Cloud on AWS
VMware and AWS Together - VMware Cloud on AWS
 
SEC304 Advanced Techniques for DDoS Mitigation and Web Application Defense
SEC304 Advanced Techniques for DDoS Mitigation and Web Application DefenseSEC304 Advanced Techniques for DDoS Mitigation and Web Application Defense
SEC304 Advanced Techniques for DDoS Mitigation and Web Application Defense
 
Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...
Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...
Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...
 
NEW LAUNCH! Bringing AWS Lambda to the Edge
NEW LAUNCH! Bringing AWS Lambda to the EdgeNEW LAUNCH! Bringing AWS Lambda to the Edge
NEW LAUNCH! Bringing AWS Lambda to the Edge
 
Automating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS CloudAutomating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS Cloud
 
AWS re:Invent 2016: Security Automation: Spend Less Time Securing Your Applic...
AWS re:Invent 2016: Security Automation: Spend Less Time Securing Your Applic...AWS re:Invent 2016: Security Automation: Spend Less Time Securing Your Applic...
AWS re:Invent 2016: Security Automation: Spend Less Time Securing Your Applic...
 
Big Data in the Cloud: How the RISElab Enables Computers to Make Intelligent ...
Big Data in the Cloud: How the RISElab Enables Computers to Make Intelligent ...Big Data in the Cloud: How the RISElab Enables Computers to Make Intelligent ...
Big Data in the Cloud: How the RISElab Enables Computers to Make Intelligent ...
 
Setup Preconfigured Protections on AWS WAF - November 2016 Webinar Series
Setup Preconfigured Protections on AWS WAF - November 2016 Webinar SeriesSetup Preconfigured Protections on AWS WAF - November 2016 Webinar Series
Setup Preconfigured Protections on AWS WAF - November 2016 Webinar Series
 
網路安全自動化 - 縮短應用維安的作業時間
網路安全自動化 - 縮短應用維安的作業時間網路安全自動化 - 縮短應用維安的作業時間
網路安全自動化 - 縮短應用維安的作業時間
 
Day 4 - Securing Your Business on the AWS Cloud
Day 4 - Securing Your Business on the AWS CloudDay 4 - Securing Your Business on the AWS Cloud
Day 4 - Securing Your Business on the AWS Cloud
 
AWS Security Best Practices (March 2017)
AWS Security Best Practices (March 2017)AWS Security Best Practices (March 2017)
AWS Security Best Practices (March 2017)
 
AWS re:Invent 2016: Workshop: Secure Your Web Application with AWS WAF and Am...
AWS re:Invent 2016: Workshop: Secure Your Web Application with AWS WAF and Am...AWS re:Invent 2016: Workshop: Secure Your Web Application with AWS WAF and Am...
AWS re:Invent 2016: Workshop: Secure Your Web Application with AWS WAF and Am...
 
AWS Public Sector Symposium 2014 Canberra | Security as an Enabler: Improving...
AWS Public Sector Symposium 2014 Canberra | Security as an Enabler: Improving...AWS Public Sector Symposium 2014 Canberra | Security as an Enabler: Improving...
AWS Public Sector Symposium 2014 Canberra | Security as an Enabler: Improving...
 
AWS re:Invent 2016: Moving Mountains: Netflix's Migration into VPC (NET304)
AWS re:Invent 2016: Moving Mountains: Netflix's Migration into VPC (NET304)AWS re:Invent 2016: Moving Mountains: Netflix's Migration into VPC (NET304)
AWS re:Invent 2016: Moving Mountains: Netflix's Migration into VPC (NET304)
 

Viewers also liked

Accelerating Organizations with Flexible IT - AWS Summit 2012 - NYC
Accelerating Organizations with Flexible IT - AWS Summit 2012 - NYCAccelerating Organizations with Flexible IT - AWS Summit 2012 - NYC
Accelerating Organizations with Flexible IT - AWS Summit 2012 - NYC
Amazon Web Services
 
AWS Customer Success Story - DotAndMedia
AWS Customer Success Story - DotAndMediaAWS Customer Success Story - DotAndMedia
AWS Customer Success Story - DotAndMedia
Amazon Web Services
 
AWS Cloud Kata 2013 | Singapore - Opening Keynote: Running Lean & Scaling Fas...
AWS Cloud Kata 2013 | Singapore - Opening Keynote: Running Lean & Scaling Fas...AWS Cloud Kata 2013 | Singapore - Opening Keynote: Running Lean & Scaling Fas...
AWS Cloud Kata 2013 | Singapore - Opening Keynote: Running Lean & Scaling Fas...
Amazon Web Services
 
Staying Lean with Amazon Web Services
Staying Lean with Amazon Web ServicesStaying Lean with Amazon Web Services
Staying Lean with Amazon Web Services
Amazon Web Services
 
AWS Customer Presentation - VMIX AWS Experience
AWS Customer Presentation - VMIX AWS ExperienceAWS Customer Presentation - VMIX AWS Experience
AWS Customer Presentation - VMIX AWS Experience
Amazon Web Services
 

Viewers also liked (20)

Mobile Application Development
Mobile Application DevelopmentMobile Application Development
Mobile Application Development
 
Accelerating Organizations with Flexible IT - AWS Summit 2012 - NYC
Accelerating Organizations with Flexible IT - AWS Summit 2012 - NYCAccelerating Organizations with Flexible IT - AWS Summit 2012 - NYC
Accelerating Organizations with Flexible IT - AWS Summit 2012 - NYC
 
AWS Customer Success Story - DotAndMedia
AWS Customer Success Story - DotAndMediaAWS Customer Success Story - DotAndMedia
AWS Customer Success Story - DotAndMedia
 
Women in Technology: Supporting Diversity in a Technical Workplace
Women in Technology: Supporting Diversity in a Technical WorkplaceWomen in Technology: Supporting Diversity in a Technical Workplace
Women in Technology: Supporting Diversity in a Technical Workplace
 
AWS Cloud Kata 2013 | Singapore - Opening Keynote: Running Lean & Scaling Fas...
AWS Cloud Kata 2013 | Singapore - Opening Keynote: Running Lean & Scaling Fas...AWS Cloud Kata 2013 | Singapore - Opening Keynote: Running Lean & Scaling Fas...
AWS Cloud Kata 2013 | Singapore - Opening Keynote: Running Lean & Scaling Fas...
 
AWS Summit 2013 | India - 0 to Production in 40 minutes, Pieter Kemps
AWS Summit 2013 | India - 0 to Production in 40 minutes, Pieter KempsAWS Summit 2013 | India - 0 to Production in 40 minutes, Pieter Kemps
AWS Summit 2013 | India - 0 to Production in 40 minutes, Pieter Kemps
 
Gaming in the Cloud at Websummit Dublin
Gaming in the Cloud at Websummit DublinGaming in the Cloud at Websummit Dublin
Gaming in the Cloud at Websummit Dublin
 
Technical Lessons on how to do Backup and Disaster Recovery in the Cloud
Technical Lessons on how to do Backup and Disaster Recovery in the CloudTechnical Lessons on how to do Backup and Disaster Recovery in the Cloud
Technical Lessons on how to do Backup and Disaster Recovery in the Cloud
 
Getting Started with Real-Time Analytics
Getting Started with Real-Time AnalyticsGetting Started with Real-Time Analytics
Getting Started with Real-Time Analytics
 
SEGA’s Digital Strategy with AWS
SEGA’s Digital Strategy with AWSSEGA’s Digital Strategy with AWS
SEGA’s Digital Strategy with AWS
 
AWS Paris Summit 2014 - T2 - Amazon Workspaces, postes de travail sur le cloud
AWS Paris Summit 2014 - T2 - Amazon Workspaces, postes de travail sur le cloudAWS Paris Summit 2014 - T2 - Amazon Workspaces, postes de travail sur le cloud
AWS Paris Summit 2014 - T2 - Amazon Workspaces, postes de travail sur le cloud
 
AWS Webinar: What is Cloud Computing? November 2013
AWS Webinar: What is Cloud Computing?  November 2013AWS Webinar: What is Cloud Computing?  November 2013
AWS Webinar: What is Cloud Computing? November 2013
 
Staying Lean with Amazon Web Services
Staying Lean with Amazon Web ServicesStaying Lean with Amazon Web Services
Staying Lean with Amazon Web Services
 
AWS Customer Presentation - VMIX AWS Experience
AWS Customer Presentation - VMIX AWS ExperienceAWS Customer Presentation - VMIX AWS Experience
AWS Customer Presentation - VMIX AWS Experience
 
SVC105 AWS Messaging - AWS re: Invent 2012
SVC105 AWS Messaging - AWS re: Invent 2012SVC105 AWS Messaging - AWS re: Invent 2012
SVC105 AWS Messaging - AWS re: Invent 2012
 
Understanding AWS Security
Understanding AWS SecurityUnderstanding AWS Security
Understanding AWS Security
 
Leveraging Hybid IT for More Robust Business Services
Leveraging Hybid IT for More Robust Business ServicesLeveraging Hybid IT for More Robust Business Services
Leveraging Hybid IT for More Robust Business Services
 
DAT201 Migrating Databases to AWS - AWS re: Invent 2012
DAT201 Migrating Databases to AWS - AWS re: Invent 2012DAT201 Migrating Databases to AWS - AWS re: Invent 2012
DAT201 Migrating Databases to AWS - AWS re: Invent 2012
 
Design Patterns for Developers - Technical 201
Design Patterns for Developers - Technical 201Design Patterns for Developers - Technical 201
Design Patterns for Developers - Technical 201
 
Scalable Database Options on AWS
Scalable Database Options on AWSScalable Database Options on AWS
Scalable Database Options on AWS
 

Similar to AWS Lunch and Learn - Security

Similar to AWS Lunch and Learn - Security (20)

AWS Enterprise Day | Securing your Web Applications in the Cloud
AWS Enterprise Day | Securing your Web Applications in the CloudAWS Enterprise Day | Securing your Web Applications in the Cloud
AWS Enterprise Day | Securing your Web Applications in the Cloud
 
Security and Compliance in the Cloud
Security and Compliance in the Cloud Security and Compliance in the Cloud
Security and Compliance in the Cloud
 
Toward Full Stack Security
Toward Full Stack SecurityToward Full Stack Security
Toward Full Stack Security
 
AWS Enterprise Summit - 클라우드에서의 보안 - 양승도
AWS Enterprise Summit - 클라우드에서의 보안 - 양승도AWS Enterprise Summit - 클라우드에서의 보안 - 양승도
AWS Enterprise Summit - 클라우드에서의 보안 - 양승도
 
How Easy to Automate Application Deployment on AWS
How Easy to Automate Application Deployment on AWSHow Easy to Automate Application Deployment on AWS
How Easy to Automate Application Deployment on AWS
 
Cloud computing &amp; aws concepts
Cloud computing &amp; aws conceptsCloud computing &amp; aws concepts
Cloud computing &amp; aws concepts
 
1. aws security and compliance wwps pre-day sao paolo - markry
1. aws security and compliance   wwps pre-day sao paolo - markry1. aws security and compliance   wwps pre-day sao paolo - markry
1. aws security and compliance wwps pre-day sao paolo - markry
 
AWS Security and SecOps
AWS Security and SecOpsAWS Security and SecOps
AWS Security and SecOps
 
Débuter sur le cloud AWS
Débuter sur le cloud AWSDébuter sur le cloud AWS
Débuter sur le cloud AWS
 
AWS Cloud Computing Tech Talks By Halieb Andemichael
AWS Cloud Computing Tech Talks  By Halieb AndemichaelAWS Cloud Computing Tech Talks  By Halieb Andemichael
AWS Cloud Computing Tech Talks By Halieb Andemichael
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
Understanding AWS Security
 Understanding AWS Security  Understanding AWS Security
Understanding AWS Security
 
AWS Security for Financial Services
AWS Security for Financial ServicesAWS Security for Financial Services
AWS Security for Financial Services
 
Cloud Native Computing - Part II - Public Cloud (AWS)
Cloud Native Computing - Part II - Public Cloud (AWS)Cloud Native Computing - Part II - Public Cloud (AWS)
Cloud Native Computing - Part II - Public Cloud (AWS)
 
AWS Webcast - Website Hosting in the Cloud
AWS Webcast - Website Hosting in the CloudAWS Webcast - Website Hosting in the Cloud
AWS Webcast - Website Hosting in the Cloud
 
AWS Security Best Practices and Design Patterns
AWS Security Best Practices and Design PatternsAWS Security Best Practices and Design Patterns
AWS Security Best Practices and Design Patterns
 
Getting Started With AWS Security
Getting Started With AWS SecurityGetting Started With AWS Security
Getting Started With AWS Security
 
AWS Security & Compliance
AWS Security & ComplianceAWS Security & Compliance
AWS Security & Compliance
 
AWS Solution Architect Associate Report
AWS Solution Architect Associate ReportAWS Solution Architect Associate Report
AWS Solution Architect Associate Report
 
ARC205 Building Web-scale Applications Architectures with AWS - AWS re: Inven...
ARC205 Building Web-scale Applications Architectures with AWS - AWS re: Inven...ARC205 Building Web-scale Applications Architectures with AWS - AWS re: Inven...
ARC205 Building Web-scale Applications Architectures with AWS - AWS re: Inven...
 

More from Amazon Web Services

Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
Amazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
Amazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
Amazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
Amazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Recently uploaded

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 

Recently uploaded (20)

Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 

AWS Lunch and Learn - Security

  • 1. How Security Works in AWS & How You Can Architect For It Markku Lepistö Principal Technology Evangelist @markkulepisto
  • 2. AWS Cloud Security “Based on our experience, I believe that we can be even more secure in the AWS cloud than in our own data centers.” -Tom Soderstrom, CTO, NASA JPL
  • 3. Visibility –  In the AWS cloud, see your entire infrastructure at the click of a mouse –  Can you map your current network?
  • 4.
  • 5. Defense in Depth Multi-level security •  Physical security of the data centers •  Network security •  System security •  Data security DATA
  • 6. Gain access to a world-class security team Where would some of the world’s top security people like to work? At scale on huge challenges with huge rewards So AWS has world-class security and compliance teams watching your back! Every customer benefits from the tough scrutiny of other AWS customers
  • 7. Build everything on a constantly improving security baseline AWS  Founda+on  Services   Compute   Storage   Database   Networking   AWS  Global   Infrastructure   Regions   Availability  Zones   Edge  Loca+ons  
  • 8. AWS  Founda+on  Services   Compute   Storage   Database   Networking   AWS  Global   Infrastructure   Regions   Availability  Zones   Edge  Loca+ons   Client-­‐side  Data   Encryp2on   Server-­‐side  Data   Encryp2on   Network  Traffic   Protec2on   Pla<orm,  Applica2ons,  Iden2ty  &  Access  Management   Opera2ng  System,  Network  &  Firewall  Configura2on   Customer  content   Customers   Let AWS do the heavy lifting for you Customers are responsible for their security and compliance IN the Cloud AWS is responsible for the security OF the Cloud
  • 9. AWS  Founda+on  Services   Compute   Storage   Database   Networking   AWS  Global   Infrastructure   Regions   Availability  Zones   Edge  Loca+ons   Your  own   accredita2on     Meet your own security objectives Your  own   cer2fica2ons   Your  own   external  audits   Customer scope and effort is reduced Better results through focused efforts Built on AWS consistent baseline controls Customers  
  • 10. AWS  Region   US-WEST (N. California) EU-WEST (Ireland) ASIA PAC (Tokyo) ASIA PAC (Singapore) US-WEST (Oregon) SOUTH AMERICA (Sao Paulo) US-EAST (Virginia) GOV CLOUD ASIA PAC (Sydney) You can stay onshore in any location that you need to
  • 11. You can choose to keep all your content onshore in any AWS region of YOUR choice •  AWS makes no secondary use of customer content •  Managing your privacy objectives any way that you want •  Keep data in your chosen format and move it, or delete it, at any time you choose •  No automatic replication of data outside of your chosen AWS Region •  Customers can encrypt their content any way they choose You always have full ownership and control
  • 12. You can improve your security with the AWS cloud
  • 13. Every solution can be resilient and fault tolerant AWS  operates  scalable,  fault  tolerant  services   Build  resilient  solu2ons  opera2ng  in  mul2ple  datacenters   AWS  helps  simplify  ac2ve-­‐ac2ve  resilient  solu2ons   All  AWS  facili2es  are  always  on   No  need  for  a  “Disaster  Recovery  Datacenter”  when  you  can   have  resilience   Every  AWS  facility  managed  to  the  same  global  standards   AWS has robust connectivity and bandwidth Each AZ has multiple, redundant Tier 1 ISP Service Providers Resilient network infrastructure
  • 14. Every network has fine-grained security built-in AvailabilityZoneA AvailabilityZoneB You control your VPC address range •  Your own private, isolated section of the AWS cloud •  Every VPC has a private IP address space you define •  Create your own subnets and control all internal and external connectivity AWS network security •  AWS network will prevent spoofing and other common layer 2 attacks •  Every compute instance gets multiple security groups - stateful firewalls •  Every subnet gets network access control lists
  • 15. You can create multi-tier architectures every time VPC A - 10.0.0.0/16 AvailabilityZoneA 10.0.1.0/24 10.0.2.0/24 10.0.3.0/24 EC 2 10.0.5.0/24 Jump host 10.0.4.0/24 EC 2 App Log EC 2 Web Load balancing
  • 16. Firewall every single compute instance VPC A - 10.0.0.0/16 AvailabilityZoneA 10.0.1.0/24 10.0.2.0/24 10.0.3.0/24 EC 2 10.0.5.0/24 Jump 10.0.4.0/24 EC 2 App “Web servers will accept Port 80 from load balancers” “App servers will accept Port 8080 from web servers” “Allow SSH access only from from Jump Hosts” Log EC 2 Web Load balancing
  • 17. Enable network access control on every subnet VPC A - 10.0.0.0/16 AvailabilityZoneA 10.0.1.0/24 10.0.2.0/24 10.0.3.0/24 EC 2 10.0.5.0/24 Jump 10.0.4.0/24 EC 2 App Log EC 2 Web “Deny all traffic between the web server subnet and the database server subnet” Load balancing
  • 18. Control every Internet connection VPC A - 10.0.0.0/16 AvailabilityZoneA 10.0.1.0/24 10.0.2.0/24 EC 2 10.0.3.0/24 EC 2 10.0.4.0/24 EC 2 App EC 2 WebEC 2 WebEC 2 EC 2 Web Internet Gateway Control Internet routing •  Create Public subnets and Private subnets •  Implement DMZ architectures as per normal best practices •  Allocate static Elastic IP addresses or use AWS- managed public IP addresses Load balancing
  • 19. Connect in private to your existing datacentres VPC A - 10.0.0.0/16 AvailabilityZoneA 10.0.1.0/24 10.0.2.0/24 EC 2 10.0.3.0/24 EC 2 10.0.4.0/24 EC 2 App EC 2 WebEC 2 WebEC 2 EC 2 Web Use Internet VPNs or use AWS Direct Connect Your premises Load balancing
  • 20. You can route to the Internet using your gateway VPC A - 10.0.0.0/16 AvailabilityZoneA 10.0.1.0/24 10.0.2.0/24 EC 2 10.0.3.0/24 EC 2 10.0.4.0/24 EC 2 App EC 2 WebEC 2 WebEC 2 EC 2 Web Use Internet VPNs or use AWS Direct Connect Your premises Load balancing
  • 21. Create flexible multi-VPC hybrid environments Your organisation Project Teams Marketing Business Units Reporting Digital / Websites Dev and Test Redshift EMR Analytics Internal Enterprise Apps Amazon S3 Amazon Glacier Storage/ Backup
  • 22. Every website can absorb attacks and scale out Amazon S3 Distributed attackers Customers Customers Route53 Singapore region CloudFront Your VPC WAFWAF WAFWAF ELB ELB ELB ELB App App App App Auto Scaling Auto Scaling Auto Scaling Auto Scaling
  • 23.   Encrypt  your  Elas2c  Block  Store  volumes  any  way  you  like   •  AWS  na2ve  EBS  encryp2on  for  free  with  a  mouse-­‐click   •  Encrypt  yourself  using  free  u2li2es,  plus  Trend,  SafeNet  and  other   partners  for  high-­‐assurance  key  management  solu2ons   Amazon  S3  offers  either  server  or  client-­‐side  encryp2on   •  Manage  your  own  keys  or  let  AWS  do  it  for  you   RedshiT  has  one-­‐click  disk  encryp2on  as  standard   •  Encrypt  your  data  analy2cs   •  You  can  supply  your  own  keys   RDS  supports  transparent  data  encryp2on  (TDE)   •  Easily  encrypt  sensi2ve  database  tables   You can encrypt your sensitive information everywhere DBA
  • 24. Tamper-resistant customer controlled hardware security modules within your VPC •  Industry-standard SafeNet Luna devices. Common Criteria EAL4+, NIST FIPS 140-2 certified •  No access from Amazon administrators who manage and maintain the appliance •  High availability and replication with on-premise HSMs Reliable & Durable Key Storage •  Use for transparent data encryption on self-managed databases and natively with AWS Redshift •  Integrate with applications using Java APIs and AWS SDKs •  Integration with marketplace disk-encryption and SSL You can store your encryption keys in AWS CloudHSM
  • 25. You can use your own HSMs if you want Your premises Applications Your HSM NATCloudHSM NATCloudHSM Volume, object, database encryption Signing / DRM / apps EC2 SYNC EBS S3 Amazon S3 Amazon Glacier
  • 26. You can enforce consistent security on your hosts Launch instanc e EC2 AMI catalogue Running instance Your instance Hardening Audit and logging Vulnerability management Malware and HIPS Whitelisting and integrity User administration Operating system Configur e instance You  control  the  configura2on  of  your  EC2   compute  instances  and  can  configure  and  harden   opera2ng  environments  to  your  own  specs Use host-based protection software •  Apply best-practice top 5 mitigation strategies! Think about how you will manage administrative users •  Restrict access as much as possible Build out the rest of your standard security environment •  Connect to your existing services, e.g. SIEM
  • 27. Old World – Static, Fixed Systems DB1 DB2 App1 App2 Web1 Web2 SW1 SW2 LB1 LB2
  • 28. “Cloud applications have amorphous, polymorphic attack surfaces.” -Jason Chan Director of Engineering, Cloud Security Netflix
  • 29. What’s not there is not a hole
  • 30. Install Only the Packages You Use YOUR CODE CORE SERVICES 3rd PARTY LIBRARIES OPERATING SYSTEM Bare minimum, Just-enough-OS Install & run only the services you use Install only the libraries you use Upgrade & Patch ALL Continuously Each app tier has only its own code
  • 31. « Cloud Instance is an implementation of a known, good state » Dr Rich Wolski, UCSB
  • 32. AMIAMIAMI YOUR CODE CORE SERVICES 3rd PARTY LIBRARIES OPERATING SYSTEM YOUR CODE CORE SERVICES 3rd PARTY LIBRARIES OPERATING SYSTEM YOUR CODE CORE SERVICES 3rd PARTY LIBRARIES OPERATING SYSTEM Pre-baked Image Base OS Image + Orchestration
  • 33. 3rd Party Configuration Mgmt & Orchestration Tools
  • 34. AWS  OpsWorks   AWS   CloudForma+on   AWS  Elas+c   Beanstalk   DevOps  framework  for   applica+on  lifecycle   management  and   automa+on   Templates  to  deploy  &   update  infrastructure   as  code   Automated  resource   management  –  web   apps  made  easy   DIY  /     On  Demand   DIY,  on  demand   resources:  EC2,  S3,   custom  AMI’s,  etc.   ControlConvenience AWS Services for Application Lifecycle Management
  • 35. Validate All Inputs Your Code Never Assume Input Validity Strict Checks and Discard API / Interface / Port
  • 36. Control access and segregate duties everywhere With  AWS  IAM  you  get  to  control  who  can  do   what  in  your  AWS  environment  and  from  where     Fine-­‐grained  control  of  your  AWS  cloud  with  two-­‐ factor  authen2ca2on     Integrated  with  your  exis2ng  corporate  directory   using  SAML  2.0  and  single  sign-­‐on   AWS account owner Network management Security management Server management Storage management
  • 37. Full visibility of your AWS environment •  CloudTrail will record access to API calls and save logs in your S3 buckets, no matter how those API calls were made Who did what and when and from what IP address •  Support for many AWS services and growing - includes EC2, EBS, VPC, RDS, IAM and RedShift •  Easily Aggregate all log information Out of the box integration with log analysis tools from AWS partners including Splunk, AlertLogic and SumoLogic Get consistent visibility of logs that you can monitor
  • 38. You get to do all of this in DEVELOPMENT TESTING PRE-PRODUCTION LIVE
  • 39. Read AWS security whitepapers, tips and good practices •  http://blogs.aws.amazon.com/security •  http://aws.amazon.com/compliance •  http://aws.amazon.com/security •  Risk and compliance, best practices, audit guides and operational checklists to help you before you go live •  Workshop  solu2ons  with  an  AWS  solu2ons  architect,  including  me!   •  Get  free  trials  of  security  from  AWS  Partners  on  the  AWS  marketplace Sign up for AWS premium support •  http://aws.amazon.com/support •  Get help when you need it most – as you grow •  Choose different levels of support with no long-term commitment Further info and how to get AWS support
  • 41. DEMOS 1.  Use IAM & Multi-Factor Authentication to login to AWS 2.  Create new Amazon VPC in Singapore 3.  IPSEC VPN connect Tokyo office with Singapore VPC 4.  Customize EC2 Instance with minimal footprint, secure config 5.  Control Security Groups
  • 42. VPN Tunnels   Customer VPN Gateway   Desktop VPC - Singapore •  VPC CIDR Network: 10.100.0.0/16 •  VPC Subnet 1: 10.100.0.0/23 •  VPC Subnet 2: 10.100.2.0/23 •  VPN Type: Dynamic BGP Office – Tokyo •  Office Network: 10.96.24.0/21 •  VPN Gateway IP: 54.92.27.101 Our First Virtual Private Cloud Application Server   Availability Zone BAvailability Zone A
  • 43. Contact Your AWS Account Manager To discuss your use cases & opportunities to try AWS services Follow us on at @AWSCloudSEAsia Join the AWS User Group at Facebook.com – search ‘AWS User Group Singapore’
  • 44. Thank  you   Markku  Lepistö  –  Principal  Technology  Evangelist   @markkulepisto